|Publication number||US7590627 B2|
|Application number||US 11/007,741|
|Publication date||Sep 15, 2009|
|Filing date||Dec 7, 2004|
|Priority date||Dec 12, 2003|
|Also published as||US20060218197|
|Publication number||007741, 11007741, US 7590627 B2, US 7590627B2, US-B2-7590627, US7590627 B2, US7590627B2|
|Inventors||Jakke Mäkelä, Marko Ahvenainen, Jukka-Pekka Vihmalo|
|Original Assignee||Maekelae Jakke, Marko Ahvenainen, Jukka-Pekka Vihmalo|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (60), Non-Patent Citations (6), Classifications (11), Legal Events (4)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This application claims priority under 35 USC §119 to Finnish Patent Application No. 20035235 filed on Dec. 12, 2003.
The present invention relates to a system comprising a terminal with a memory for storing a data file, means for selecting a data file to be deleted, and means for marking the data file selected to be deleted, as having been deleted, and at least one second device with a memory. The invention also relates to a terminal comprising a memory for storing a data file, means for selecting a data file to be deleted, and means for marking a data file selected to be deleted as having been deleted. Furthermore, the invention relates to a method for processing data files in connection with a terminal, wherein data files are stored in a memory, a data file is selected to be deleted, and the data file selected to be deleted is marked as having been deleted. Finally, the invention relates to a computer software product with machine executable program instructions for processing data files in connection with a terminal, for storing data files in the memory of the terminal, for selecting a data file to be deleted, and for marking the data file selected to be deleted as having been deleted.
In a data processor, information is typically stored in data files, wherein the data processors comprise an arrangement for processing such files. Information about each file is usually entered in a so-called directory, wherein the stored file can be retrieved later for processing. In many cases, such an entry in the file directory comprises e.g. the time of creating the file (date and time), the time of editing the file, the file name, the directory path, the file size, the file type, and possibly also information about whether the file has been edited e.g. after the latest backup copy was made.
In the data processor, the files are normally stored in a storage means in a disk drive unit, which storage means can be e.g. a fixed disk, a diskette, a memory card, or the like. Such storage means are normally divided into memory units of equal sizes, i.e. so-called sectors, wherein the file to be stored is divided into elements having the size of the memory units, and each element of the file is stored in one memory unit. Thus, the file directory or the file itself contains information about which memory units are used for the storage of said file and what is the correct order of the memory units. In one operating system, a so-called file allocation table (FAT) is used for storing information about the file to which each sector belongs and also the next/preceding memory unit. The file can thus be retrieved from the storage means by examining the information of the file allocation table. In practice, the data files can be physically stored on the storage means in a very fragmented way. However, each file constitutes a logical entity which is processed by the operating system of the data processor, for example, by means of said file allocation table, or the like. Thus, the applications can also process the file as a single logical entity.
In some systems, it is also possible to use so-called backup copying of files, wherein the same file is stored in two or more copies. In this case, the file can be restored either from an intact backup copy or by combining flawless parts from several copies. In view of the applications, however, it is a single file.
Files can be deleted from a storage means by selecting a file to be deleted from a directory and by entering a command to delete the file. What takes place when the file is deleted will depend, for example, on the operating system used in the data processor. In one operating system, a file is deleted by replacing the first letter in the file name in the directory with a given symbol, in which case the file is not displayed when the directory is browsed, and parts which have contained stored information of said file in the memory of the data processor are marked as being free. Thus, these parts of the memory, marked to be free, can be used for storing other files.
In another operating system, data files are deleted in such a way that the data is transferred into a so-called recycle bin, wherein the content of the data file is stored in a kind of wastebasket file. At this stage, the content of the data file to be deleted can also be compressed so that the data file transferred to the wastebasket will require less space. Thus, the file can be restored by retrieving it from the wastebasket. On the other hand, the file can be deleted finally by removing it from the wastebasket, after which, in practice, the file can no longer be recovered. It should be noted that the transfer of the file into the wastebasket does not necessarily mean that the physical data of the file were transferred to another location, but the transfer into the wastebasket can be made in a kind of logical way, for example, by marking the memory units allocated for the file to belong to the wastebasket. This can be done, for example, by changing the values of the file pointers in such a way that, with respect to the data processor, the file is processed as if it were stored in the wastebasket. These memory units are thus not completely released for rewriting, but they are still available.
The data deleting systems of prior art have some drawbacks, particularly if the possibility to recover a deleted file should be provided. If the file is deleted by removing its data from the file directory, the file can be recovered, in practice, as long as no new information has been stored in any of the sectors used for storing the file. When any other information has been stored in any one of such sectors, the original file cannot be recovered, at least not completely. In data processors with relatively little storage capacity, released sectors are normally used for other purposes relatively soon, wherein a deleted file can normally not be restored any longer. Accordingly, in operating systems applying said wastebasket, this wastebasket requires storage capacity, which limits considerably the use of the memory for other purposes, particularly in the case of portable data processors with a storage means of a relatively small size. On the other hand, when the wastebasket is used, there may be a need to reduce the size of the wastebasket to be so small that it will only take in a few deleted files at a time. Because such a wastebasket is filled up relatively quickly, the number of files in the wastebasket must be kept relatively small. Also in this case, it is often impossible to restore files in practice.
It is an aim of the present invention to provide an improved arrangement for storing and restoring deleted files. The invention is based on the idea that, if necessary, a file to be deleted from a terminal is transmitted to another device for storage. In practice, this means, for example, that the wastebasket of the terminal, of a part of it, is arranged in a second device, and a possibility is provided to set up a data transmission connection between the terminal and this second device, for transmitting information at least from the terminal to this second device. In the arrangement according to another embodiment of the invention, the data transmission connection is full duplex, wherein the files can also be easily restored by using the data transmission connection from this second device to the terminal. In the arrangement according to a third embodiment of the invention, the wastebasket is distributed among more devices than one, which may further increase the memory capacity available for the wastebasket. In an illustrative system said at least one second device is provided with a storage location for files marked as deleted, for storing data files marked as deleted; that the terminal is provided with a storage location for storing at least a part of the information of the file marked as deleted; and means for transmitting at least a part of the information marked as deleted, to be stored, if necessary, in the storage location for deleted files, formed in said at least one second device. The terminal is provided with a storage location for storing at least a part of the information of the file marked as deleted; and means for transmitting at least a part of the file marked as deleted, to be stored in at least one second device which is provided with a storage location for files marked as deleted. In an illustrative method at least a part of the information of the file marked as deleted is stored in the terminal, and, if necessary, at least a part of the file marked as deleted is transmitted to be stored in at least one second device. In an illustrative computer software product the computer software product comprises machine executable program instructions for storing at least a part of the information of the data file marked as deleted, in the terminal, and, if necessary, for transmitting at least a part of the file marked as deleted to be stored in at least one second device.
The present invention shows remarkable advantages over solutions of prior art. By the arrangement of the invention, the part of the deleted files allocated in the storage location, i.e. the wastebasket, or at least a significant part of them, can be released for other purposes, such as the storage of ordinary files, in a portable data processor. In the second device, the wastebasket can be provided with more space than in the portable data processor, wherein it is normally possible to store deleted files for a longer time in the wastebasket and thus to increase the probability that, if necessary, the deleted file can also be restored in the portable data processor. Furthermore, the invention can be applied in such a way that the wastebasket is formed in one or more such devices in the vicinity, wherein the arrangement of this function has the advantage that other devices in the vicinity can be temporarily used to increase the storage capacity allocated for deleted files in the portable data processor. The processing of the deleted files can also be optimized so that in a situation in which any file should be deleted permanently from the wastebasket, the deleting can be started, for example, from the oldest file on, i.e. the file deleted the longest time ago. Thus, for example, files which have been deleted unintentionally, are more likely to be recoverable in the portable data processor. On the other hand, files which were deleted a long time ago will no longer load the wastebasket in vain.
In the following, the present invention will be described in more detail with reference to the appended drawings, in which
In the following, the invention will be described by using, as an example of a portable data processor, a mobile terminal 1 as shown in
In the description of the present invention, the term data file, or file, refers primarily to a logical file which can thus be stored as a single data cluster or distributed into several smaller units which are stored in different memory units in the storage means 3.1.
We shall now describe the system according to a first embodiment of the invention with reference to
At the stage when a file is deleted, information of the file is deleted from the directory and the memory units used by the file are marked to be free, wherein these memory units can be used for another purpose, such as for the storage of other files. The file to be deleted is logically transferred to a local storage location 11 for deleted files, i.e. a wastebasket, and in this embodiment of the present invention, this is performed for example in the following way. It is examined in the terminal 1 whether the memory 3 of the terminal has a sufficient space for storing this file in the wastebasket. If a sufficient space is not available, at least a part of the file to be deleted is transferred to a server 8. In this context, it should be mentioned that the server 8 can be any device with a possibility for storing files. Examples of such servers 8 to be mentioned include a data processor coupled to a local area network (a work station, a server), another portable data processor, a personal computer, or the like.
When the file to be deleted, or a part of it, has been selected to be transferred to the server 8, a notice of this can be given to the user of the terminal 1, wherein he/she can decide whether or not to start to transfer the file. If the user decides to transfer the file, the transmission of the file from the terminal 1 to the server 8 is started. On the other hand, the file can be transferred without asking for the user's permission for the transfer of the file. Thus, it can be defined, for example in the user settings, whether the transfer will be made automatically or whether the user will be requested to give permission for the file transfer before the transfer is started.
The transfer of the file to the server 8 can be implemented by a suitable data transmission arrangement. For example, it is possible to use the data link of a mobile communication network (GSM datalink), if it is available. The data transmission can also be made by using the GPRS packet network, if it is available. If the server 8 is close to the terminal 1, it is also possible to use a short-distance data transmission method, such as the Bluetooth™ system, the WLAN system, an optical short-distance data transmission system, cabled transmission, or another suitable data transmission system. The information of the file to be transferred is received in the server 8 and stored in a storage location 13 for deleted files, i.e. a kind of a data file (wastebasket), arranged in the memory 7 of the server 8. If necessary, the data can also be compressed at the stage of the file transmission and/or storage, wherein the file transmission is accelerated and the file normally fits in a smaller space. The compressing method used is lossless compressing, if it is desired that the compressed file can be restored to its original format.
In this embodiment, the file system of the terminal 1 cannot process the wastebasket 13 arranged in the server 8. Thus, if the deleted file is to be recovered from the wastebasket of the server 8 to the terminal 1, this must be performed, for example, by the server 8, via another computer 14 contacting the server 8, or by a particular program to be run in the terminal 1, whereby it is possible to contact the server 8, to browse the contents of the wastebasket therein, and to transfer the desired file to the terminal 1. For recovering the file, it is also possible to use another portable memory means 15, such as a diskette, a memory card, or the like. In
In a system according to the second embodiment of the invention, which is illustrated in
In the system according to the third embodiment of the invention, the wastebasket is distributed into two or more server devices 8.1, 8.2, 8.n. This is illustrated in
The invention can also be applied in such a way that one or more nearby data processors 9 with storage means 9.1 for the storage of files are used as the location for storing deleted files.
After the terminal 1 has determined that there is at least one second nearby data processor 9 for the storage of deleted files, the necessary measures can be taken to use the second data processor 9 as the storage location for the deleted files. In this embodiment, it is also possible to ask the users of the terminal 1 and the second data processor if they allow the use of the second data processor 9 as the storage location for files deleted from the terminal 1. If the second data processor 9 is used as the storage location of deleted files, data compression and/or encryption can be used in the transfer and the storage of the deleted files. The encryption is used to prevent access to the content of the deleted files by parties other than the user of the terminal 1. The files are transferred, for example, by means of wireless short-distance communication means. The recovery of the files from the storage location for deleted files can also be performed by means of the short-distance communication means.
The above-described embodiment is suitable, for example, for situations in which a given place is entered and left by persons carrying a data processor which can be used in the system. Such places include, for example, offices, public places, such as bus stations, railway stations, airports, business enterprises, etc. The terminal 1 and the data processors 9 thus constitute a kind of an ad hoc network, in which data can be transmitted. When a data processor 9 or a terminal 1 exits the area, the storage location of the files deleted from the terminal 1 is deleted from the data processors 9. At this stage, if necessary, an attempt may be made to transfer the deleted files back to the terminal 1, if it is possible, or the deleted files are deleted permanently from the storage location.
We shall now discuss the logical structure of the arrangement for storing deleted files according to one embodiment of the invention. The arrangement comprises various tables 10, 11, 13 for the storage of certain information. The system comprises, for example, a server table 10 with information about the server 8. When more than one servers 8.1-8.n are used, this server table 10 comprises information about all these servers 8.1-8.n which are used for implementing the storage location of deleted files. The server table 10 comprises a server ID 10.1 as well as other information 10.2 about the server 8. The server table 10 is stored in the memory 3 of the terminal 1. The memory 3 of the terminal 1 also comprises stored information about a local storage location for deleted files, i.e. a local wastebasket 11, comprising data about files deleted from the terminal 1. This information includes, for example, the time 11.1 of creating the file, the time 11.2 of deleting the file, the file name 11.3, the server ID 11.4, as well as the name 11.5 of the deleted file in the server 8.1-8.n. Also a terminal ID 12 is stored in the terminal 1. This terminal ID 12 can be, for example, the International Mobile Equipment Identity IMEI or another code which defines the data processor in an unambiguous way, at least within a given geographical region.
If the invention according to the above-described embodiment is used in a limited geographical area, the code of the data processor should be individual within said geographical area, but the same code can also be used in data processors in different geographical areas.
The server 8 comprises a storage location for deleted files, i.e. a remote wastebasket 13, for the storage of files deleted from the terminal 1. This remote wastebasket 13 comprises, for example, information about the terminal ID 12 stored in the identifier field 13.1. Thus, the server 8 may simultaneously comprise several different remote wastebaskets 13 relating to different terminals. Preferably, the remote wastebasket 13 of the server also comprises information about the time 13.2 of creation and the time 13.3 of deletion of the deleted file, the name 13.4 used for the file in the terminal 1, information about the file name in the server 13.5, as well as one or more file pointers 13.6 to the storage location of the deleted file. Furthermore, the server 8 may comprise a file allocation table, or the like, indicating which memory units are allocated for each deleted file. Thus, the file pointer 13.6 in the table 13 points, for example, to the location where the allocation data of the file begin in this file allocation table.
Although the invention has been described above in such a way that for transferring a file to the wastebasket, the physical data of the file are transferred, it is obvious that this is not necessary in all situations. For example, it is possible to transfer only some file pointers, or the like, which indicate that the memory units used by the file are now allocated for the wastebasket; in other words, the file has been logically transferred to the wastebasket. Thus, the file is marked as having been deleted, although the other physical data of the file were left intact.
The physical transfer of the file into the wastebasket is not necessarily started at once in connection with the logical deletion of the file, but the physical transfer may be timed to take place, for example, at night or at another suitable time. The data transfer can be timed to take place at a time which is more advantageous, for example, in view of the data transmission costs, or in a situation in which the data transmission connection of the terminal 1 (e.g. GPRS data connection) is active in any case. The physical transfer of the file can also be timed to take place according to the degree of filling of the storage means 3.1 of the terminal 1. Thus, the physical data of the files are maintained in the storage means 3.1 of the terminal 1 as long as possible without risking the storage of other data. In this alternative, the physical transfer of the data is carried out, for example, when the relationship between the free memory space in the storage means 3.1 and the storage capacity of the storage means 3.1 goes below a given value.
We shall now discuss the operation of the method according to one embodiment of the invention with reference to the flow charts of
It will be obvious that the above-presented method is only one option, but in practical applications, also methods different from the above-presented method can be implemented.
In yet another embodiment of the invention, the following steps are taken after examining the degree of filling of the wastebasket in block 602. Instead of dividing the file F into parts and/or transferring it into the remote wastebasket 13, it is first examined, if the local wastebasket 11 contains such complete older files FF which could be, if necessary, divided into parts X, Y, and if e.g. part Y (or the whole file FF) could be transferred to the remote wastebasket 13. If one or more such files are found, an attempt can be made to transfer one or more such files FF to the remote wastebasket 13. However, if no complete files which could be transferred to the remote wastebasket 13 are found, the file F to be deleted is divided, if necessary, to parts X, Y, and the part Y (or, if necessary, the whole file F to be deleted) is transferred to the remote wastebasket 13 e.g. in the way described above with reference to
The flow chart of
We shall now describe a so-called cost function to be used in the method according to one embodiment of the invention. In the definition of the cost function, the terminal 1 is also referred to with the letter A, and the server 8 is also referred to with the letter B. It is assumed that the file to be deleted is originally in the terminal 1 and that the length of the file is LF. The terminal 1 comprises free memory capacity CA for storing the file. The terminal 1 is arranged in a data transmission connection with the server 8 by means of a connection IF. The free memory capacity for the remote wastebasket 13 in the server 8 is indicated with the abbreviation CB.
The cost function can be defined in a variety of ways depending, e.g., on the starting points and aims of each application in question, wherein the non-restrictive example to be presented below is only one possible way of implementation. It is assumed here that the file F is divided into a first part X with a length LX and a second part Y with a length LY. Of these parts, the first part X will be left in the terminal 1 and the second part Y will be transferred to the remote wastebasket 13. In the cases complying with the first and second embodiments of the invention, either the first part X or the second part Y has the length 0, i.e., either X=0 or Y=0. Thus, the division does not actually need to be made, but either the first part X is stored in the local wastebasket 11 (Y=0) or the second part is stored in the remote wastebasket 13 (X=0). In the case according to the third embodiment, both the length LX of the first part X and the length LY of the second part Y can be different from zero.
Generally, the following can be stated: In view of the terminal 1, the cost function CFA(LX) for the file F depends on the relationship between the length LF of the file F and the storage capacity CA of the terminal 1. If the length LX of the first part X is considerably smaller than the free memory capacity CA in the terminal 1, and if the free memory capacity CA in the terminal 1 is relatively large, it means that the storage of the first part X in the terminal 1 can be considered cost-effective, because it does not significantly use the storage resources of the terminal 1. However, if the length LX of the first part X is close to the free memory capacity CA of the terminal 1, and/or the free memory capacity CA of the terminal 1 is very small, then the storage of the first part X in the terminal 1 will require a relatively large quantity of the memory capacity CA. Consequently, it is probable that, in practice, the space allocated for the storage of the first part X should be available for the storage of another, non-deleted file, e.g. when editing a file or creating a new file. If the second part Y is transferred to the remote wastebasket 13 provided in the server 8, this may cause e.g. data transmission costs CIF(Y) to the user of the terminal 1, and costs may also be caused by the storage in the server 8.
These costs to be presented in connection with the cost function must not be interpreted as financial costs only, but e.g. the resource allocation can also be regarded as a cost, because it requires a part of the memory capacity.
Data storage in the remote wastebasket 13 can be indicated with the cost function CFB(Y). We now have three cost functions CFA(X), CFI(Y) and CFB(Y) to consider. Thus, the first cost function CFA(X) is the cost function causing the storage of the first part X in the terminal 1, and factors related to it include the length LX of the first part X and the free memory capacity CA in the terminal 1. The second cost function CFI(Y) is the cost function related to the data transmission, and factors involved include the length LY of the second part Y, the data transmission costs, the bandwidth and/or data transmission rate available for the data transmission, etc. The third cost function CFB(Y) consists of the storage of the second part Y in the remote wastebasket 13 of the server 8, wherein the factors of the cost function are the length LY of the second part Y as well as the free memory capacity CB available for the remote wastebasket 13 in the server 8. Thus, the total cost function CFT(X,Y) is the weighted sum of the three above-mentioned cost functions. An optimum solution is obtained by setting the parts X and Y, i.e. the length LX of the first part X and the length LY of the second part Y, in such a way that the total cost function LFT(X,Y) is minimized.
In one example case, the cost functions are determined as follows. The first cost function CFA(X) is determined as the product KA×LX×CA/(CA−LX). The second cost function CFI(Y) is determined on the basis of the product KI×LY. Accordingly, the third cost function CFB(Y) is determined as the product KB×LY×CB/(CB−LY). In the above-mentioned functions, the terms KA, KI and KB are weight coefficients whose selection is affected e.g. by the memory capacity in the application available in each case, as well as the data transmission costs.
To simplify the computation, we can for example assume that the memory capacity CB of the server 8 is, in practice, indefinite, wherein the total cost function CFT(X,Y) is reduced to the form CFA(X)+CFI(Y). In another case accordingly, it is assumed that the file is not divided, wherein the file is either stored in the terminal 1 or transferred as a whole to the remote wastebasket 13 in the server 8. In this case, the possible values of the total cost function are only CFA(F) or CFI(F), wherein the cost function with the smallest value is selected. For example, if CFA(F) receives the smallest value, the whole file F is maintained in the terminal 1; otherwise, the whole file F is transferred to the remote wastebasket 13 in the server 8.
In yet another reduced situation, it is assumed that the length of the first part X is only a few first bytes in the file F, and the second part Y consists of the rest of the file F. Thus, the length LY of the second part Y is typically significantly greater than the length LX of the first part X. However, it is also possible to divide the file F into the first part X and one or more second parts Y in another way, depending on the application.
The terminal 1 also comprises the necessary pointers to determine the storage location of the deleted files. The pointers can point at e.g. all the files in the local wastebasket 11 and/or the remote wastebasket 13, or a file system to be used for managing the remote wastebasket 13 in the server 8.
The different functions of the present invention can be largely implemented by programming, for example, in the software of the control block 2 of the terminal 1 and, if necessary, also in the software of the server 8.
It will be obvious that the present invention is not limited solely to the above-presented embodiments but it can be modified within the scope of the appended claims.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5375199 *||Jun 4, 1991||Dec 20, 1994||Digital Equipment Corporation||System monitoring method and device including a graphical user interface to view and manipulate system information|
|US5548740 *||Feb 9, 1993||Aug 20, 1996||Sharp Kabushiki Kaisha||Information processor efficiently using a plurality of storage devices having different access speeds and a method of operation thereof|
|US5598532 *||Oct 21, 1993||Jan 28, 1997||Optimal Networks||Method and apparatus for optimizing computer networks|
|US5683432 *||Jan 11, 1996||Nov 4, 1997||Medtronic, Inc.||Adaptive, performance-optimizing communication system for communicating with an implanted medical device|
|US5687216 *||May 13, 1996||Nov 11, 1997||Ericsson Inc.||Apparatus for storing messages in a cellular mobile terminal|
|US5764866 *||May 13, 1996||Jun 9, 1998||Ricoh Company, Ltd.||Scanner, network scanner system, and method for network scanner system|
|US5809282 *||Jun 7, 1995||Sep 15, 1998||Grc International, Inc.||Automated network simulation and optimization system|
|US5930243 *||Oct 11, 1996||Jul 27, 1999||Arraycomm, Inc.||Method and apparatus for estimating parameters of a communication system using antenna arrays and spatial processing|
|US6026375 *||Dec 5, 1997||Feb 15, 2000||Nortel Networks Corporation||Method and apparatus for processing orders from customers in a mobile environment|
|US6119011 *||Mar 5, 1998||Sep 12, 2000||Lucent Technologies Inc.||Cost-function-based dynamic channel assignment for a cellular system|
|US6154745 *||Dec 23, 1997||Nov 28, 2000||Nokia Mobile Phones Ltd.||Method for transmission of information to the user|
|US6182079 *||Dec 16, 1996||Jan 30, 2001||British Telecommunications Public Limited Company||Specifying indexes by evaluating costs savings for improving operation in relational databases|
|US6311187 *||Dec 29, 1998||Oct 30, 2001||Sun Microsystems, Inc.||Propogating updates efficiently in hierarchically structured data under a push model|
|US6377957 *||Dec 29, 1998||Apr 23, 2002||Sun Microsystems, Inc.||Propogating updates efficiently in hierarchically structured date|
|US6519410 *||Mar 8, 2000||Feb 11, 2003||Matsushita Electric Industrial Co., Ltd.||Information recording medium, apparatus and method for recording or reproducing the recording medium|
|US6578052 *||Sep 28, 1999||Jun 10, 2003||Microsoft Corporation||Database clean-up system|
|US6611500 *||Nov 4, 1999||Aug 26, 2003||Lucent Technologies, Inc.||Methods and apparatus for derivative-based optimization of wireless network performance|
|US6650781 *||Jun 8, 2001||Nov 18, 2003||Hitachi, Ltd.||Image decoder|
|US6823350 *||Sep 28, 1999||Nov 23, 2004||Microsoft Corporation||Database clean-up system|
|US6950646 *||Apr 27, 2001||Sep 27, 2005||Hewlett-Packard Development Company, L.P.||Information acquisition decision making by devices in a wireless network|
|US6988236 *||Apr 4, 2001||Jan 17, 2006||Broadcom Corporation||Method for selecting frame encoding parameters in a frame-based communications network|
|US7032003 *||Aug 13, 2001||Apr 18, 2006||Union Gold Holdings, Ltd.||Hybrid replication scheme with data and actions for wireless devices|
|US7072672 *||Nov 1, 2002||Jul 4, 2006||Nokia Corporation||Disposable mini-applications|
|US7130622 *||Jun 1, 2005||Oct 31, 2006||Nokia Corporation||Disposable mini-applications|
|US7440559 *||Oct 22, 2003||Oct 21, 2008||Nokia Corporation||System and associated terminal, method and computer program product for controlling the flow of content|
|US7471878 *||Apr 27, 2004||Dec 30, 2008||Panasonic Corporation||Playback program|
|US20010014836 *||Feb 12, 2001||Aug 16, 2001||Kenji Tamaki||Production planning system|
|US20020016853 *||Jan 24, 2001||Feb 7, 2002||Bryan Ressler||Method and apparatus for transferring data between computing systems|
|US20020052872 *||Oct 16, 2001||May 2, 2002||Fuji Xerox Co., Ltd||Electronic information management server, electronic information management client, electronic information management method and recording medium for recording electronic information management program|
|US20020071419 *||Dec 7, 2000||Jun 13, 2002||David Paranchych||Method and apparatus for load balancing in CDMA/HDR networks|
|US20020072355 *||May 4, 2001||Jun 13, 2002||Gi-O Jeong||Method for distributing application software in mobile communication system|
|US20020107587 *||Feb 7, 2002||Aug 8, 2002||Kabushiki Kaisha Toshiba||Information storage apparatus and article of manufacture|
|US20020194474 *||Jan 30, 2002||Dec 19, 2002||Takeshi Natsuno||Method and apparatus for delivering program to storage module of mobile terminal|
|US20030085932 *||Apr 19, 2001||May 8, 2003||Sukendeep Samra||System and method for optimizing the processing of images|
|US20030120685 *||Nov 6, 2002||Jun 26, 2003||Chris Duncombe||Method and system for access to automatically synchronized remote files|
|US20030162562 *||Feb 22, 2002||Aug 28, 2003||Troy Curtiss||Accessory detection system|
|US20030166399 *||Mar 1, 2002||Sep 4, 2003||Timo Tokkonen||Prioritization of files in a memory|
|US20030194989 *||Aug 9, 2001||Oct 16, 2003||Christian Guion||Method for providing identification data of a banking card to a user|
|US20030217057 *||May 7, 2003||Nov 20, 2003||Nec Corporation||Contents using method, contents using system, contents using program, and server and electronic device used in same system|
|US20030220949 *||Jan 21, 2003||Nov 27, 2003||Columbia Data Products, Inc.||Automatic deletion in data storage management|
|US20030236867 *||May 14, 2002||Dec 25, 2003||Takeshi Natsuno||System for managing program stored in storage block of mobile terminal|
|US20040006517 *||Feb 23, 2001||Jan 8, 2004||Sunao Takatori||Rental machine and storage medium|
|US20040098428 *||Nov 14, 2003||May 20, 2004||Schulze Paul E.||Memory card having one-time programmable memory|
|US20040122873 *||Dec 20, 2002||Jun 24, 2004||International Business Machines Corporation||Free space management|
|US20040158829 *||Mar 30, 2001||Aug 12, 2004||Evgenij Beresin||Downloading application software to a mobile terminal|
|US20040242216 *||Jun 2, 2003||Dec 2, 2004||Nokia Corporation||Systems and methods for transferring data between mobile stations|
|US20040266442 *||May 31, 2002||Dec 30, 2004||Adrian Flanagan||Method and system for optimising the performance of a network|
|US20050021661 *||Nov 1, 2001||Jan 27, 2005||Sylvain Duloutre||Directory request caching in distributed computer systems|
|US20050027757 *||Aug 1, 2003||Feb 3, 2005||Rick Kiessig||System and method for managing versions|
|US20050066305 *||Sep 20, 2004||Mar 24, 2005||Lisanke Robert John||Method and machine for efficient simulation of digital hardware within a software development environment|
|US20050083794 *||Oct 20, 2004||Apr 21, 2005||Kenji Tagawa||Semiconductor memory card, playback apparatus, recording apparatus, playback method, recording method, and a computer-readable storage medium|
|US20050108289 *||Nov 26, 2002||May 19, 2005||East Simon J.||Method of replicating data between computing devices which each use local clocks|
|US20050120050 *||Mar 28, 2002||Jun 2, 2005||Andreas Myka||Enhanced storing of personal content|
|US20050192686 *||Nov 10, 2004||Sep 1, 2005||Teruto Hirota||Semiconductor memory card, playback apparatus, recording apparatus, playback method, recording method, and computer-readable recording medium|
|US20050222918 *||Jun 1, 2005||Oct 6, 2005||Marko Vanska||Disposable mini-applications|
|US20050228795 *||Jun 3, 2005||Oct 13, 2005||Shuster Gary S||Method and apparatus for identifying and characterizing errant electronic files|
|US20050231753 *||Apr 20, 2004||Oct 20, 2005||Markus Mertama||Method, apparatus and computer program product for printing document data|
|US20050239494 *||Jul 23, 2003||Oct 27, 2005||Research In Motion Limited||Data store management system and method for wireless devices|
|US20050278453 *||Jun 14, 2004||Dec 15, 2005||Ludmila Cherkasova||System and method for evaluating a heterogeneous cluster for supporting expected workload in compliance with at least one service parameter|
|US20060149792 *||Feb 28, 2006||Jul 6, 2006||Hitachi, Ltd.||Method and apparatus for synchronizing applications for data recovery using storage based journaling|
|1||*||"A Flexible Multiple Mobile Robots System"-Kun-Chee Henry Fok & Mansur R. Kabuka-Robotics and Automation, IEEE transaction On-vol. 8, No. 5, Oct. 1992 (pp. 1-17 607-623).|
|2||*||"Minimization of Communication Cost Through caching in Mobile Environments"-Prasad Sistla, Ouri Wolfson and Yixiu Huang-1998-IEEE Transactions On Parallel and Distributed Systems-vol. 9, No. 4 Apr. 1998 (pp. 378-390).|
|3||*||"The Accurancy of Proportional Cost Models: Evidence from Hopspital service Department"-Eric Noreen and Naomi Soderstrom-Revioew of Accounting Studies-vol. 2, No. 1, Mar. 1997 (pp. 89-114).|
|4||Patent Abstracts of Japan, publication No. 08-328929, publication date Dec. 13, 1996 and machine translation of Japanese document.|
|5||Patent Abstracts of Japan, publication No. 2002-049510, publication date Feb. 15, 2002 and machine translation of Japanese document.|
|6||Patent Abstracts of Japan, publication No. 2003-085027, publication date Mar. 20, 2003 and machine translation of Japanese document.|
|U.S. Classification||1/1, 707/999.005, 455/418, 455/420, 707/999.2|
|International Classification||G06F, G06F17/30, G06F7/00|
|Cooperative Classification||Y10S707/99935, G06F17/30067|
|Aug 15, 2005||AS||Assignment|
Owner name: NOKIA CORPORATION, FINLAND
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MAKELA, JAKKE;AHVENAINEN, MARKO;VIHMALO, JUKKA-PEKKA;REEL/FRAME:016637/0650;SIGNING DATES FROM 20050519 TO 20050520
|Sep 28, 2007||AS||Assignment|
Owner name: SPYDER NAVIGATIONS L.L.C., DELAWARE
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NOKIA CORPORATION;REEL/FRAME:019893/0758
Effective date: 20070322
|Jul 22, 2011||AS||Assignment|
Free format text: MERGER;ASSIGNOR:SPYDER NAVIGATIONS L.L.C.;REEL/FRAME:026637/0611
Owner name: INTELLECTUAL VENTURES I LLC, DELAWARE
Effective date: 20110718
|Feb 25, 2013||FPAY||Fee payment|
Year of fee payment: 4